Issue NTP server NTPSEC 1.2.2

After a year and a half of development publishing the system of synchronization of the exact time ntpsec 1.2.2 , which is the fork of the reference implementation of the NTPV4 protocol (NTP Classic 4.3.34), focused on the processing of the code base in order to increase safety (cleaning outdoor cleaning (cleaning the obsolete. Codes, methods of preventing attacks and protected functions for working with memory and lines are involved). The project is developing under the leadership of Eric Raymond (Eric S. Raymond) at participation some developers of the original NTP Classic, engineers from Hewlett companies Packard and Akamai Technologies, as well as projects gpsd and RTEMS . The initial texts of ntpsec changes in the new version:

  • Restored the support of the NTPV1 protocol and its implementation was cleaned. In output of the NTPQ Sysstats command, information about the traffic NTPV1 was added, and meters for NTPV1.
  • are added to the Sysstats log.

  • In the implementation of the NTS protocol (Network Time Security), the possibility of using masks of host names, for example, *.Example.com, has been added. In the NTS server, cookie storage of keys is ensured for 10 days, which allows customers who are circulating once a day to do without the use of NTS-Ke (NTS Key Establishmenet) to maintain cookies in the current state.
  • In Rawstats, it is provided to journaling discarded packages.
  • In the assembly system, support for Python 2.6.
  • Added support for Opensl 3.0 and Libressl.
  • FreeBSD is provided at the Nanoseconds level when receiving information about the time.
/Media reports cited above.